home *** CD-ROM | disk | FTP | other *** search
- INSTITUTE FOR COMPUTER SCIENCES AND TECHNOLOGY
- NATIONAL BUREAU OF STANDARDS
- GAITHERSBURG, MARYLAND 20899
-
-
- The Institute for Computer Sciences and Technology is a center of
- technical expertise in information technology. While ICST focuses
- primarily on helping the Federal government make effective use of
- computers and information technology, ICST products, services, and
- technical support are used by the private sector and all levels of
- government as well.
-
- ICST's major activities are:
-
- o determining requirements for and participating in the
- development of national and international voluntary industry
- standards for computer products and services;
-
- o developing testing methodologies to support the development
- and implementation of standards;
-
- o developing guidelines, technology forecasts, and other
- products to aid in the effective management and application of
- computers.
-
- o disseminating and exchanging information with Federal, State
- and local governments, industry, professional, and research
- organizations on computer use and standards needs;
-
- o providing technical support for the development of government
- policies in information technology;
-
- o providing direct technical assistance to Federal agencies on a
- cost reimbursable basis;
-
- o carrying out applied research and development, often in
- cooperation with other government agencies and with industry.
-
-
- COMPUTER SECURITY ACTIVITIES
-
- Computer security is a critical component of the overall management of
- computers. Losses of confidentiality, integrity, and availability of
- computer data and processing resources can result from both accidental
- and intentional events. Working with users and industry to determine
- their requirements for computer security guidance and standards, ICST
- identifies and develops cost-effective methods to protect computers and
- data against all types of losses. These methods include both automated
- techniques that are integrated into computers and terminals as well as
- sound management practices. ICST products include guidance, standards,
- technical reports, conferences, teleconferences, workshops, advice, and
- technical support activities.
-
- HOW TO ORDER PUBLICATIONS
-
- These publications are available through the Government Printing Office
- (GPO) and the National Technical Information Service (NTIS). The
- source and price for each publication are indicated. Orders for
- publications should include title of publication, NBS publication
- number (Spec. Pub. 000, Tech. Note 000, etc.) and NTIS or GPO number.
- Your may order at the price listed; however, prices are subject
- to change without notice.
-
- Submit payment in the form of postal money order, express money order
- or check made out to the Superintendent of Documents for GPO-stocked
- documents or to the National Technical Information Service for NTIS-
- stocked documents.
-
- Mailing addresses are:
-
- Superintendent of Documents
- U.S. Government Printing Office
- Washington, DC 20402
-
- National Technical Information SErvice
- 5285 Port Royal Road
- Springfield, VA 22161
-
- Telephone numbers for information are:
-
- GPO Order Desk (202) 783-3238
- NTIS Orders (703) 487-4780
- NTIS Information (703) 487-4600FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATIONS (FIPS)
-
-
- Federal Information Processing Standards Publications (FIPS PUBS) are
- developed by the Institute for Computer Sciences and Technology (ICST)
- and issued under the provisions of the Federal Property and
- Administrative Services Act of 1949, as amended; Public Law 89-306 (79
- Stat. 1127); Executive Order 11717 (38 FR 12315); and Part 6 of Title
- 15 of the Code of Federal Regulations (CFR).
-
- FIPS PUBS are sold by the National Technical Information Service
- (NTIS), U.S. Department of Commerce. A list of current FIPS covering
- all ICST program areas is available from:
-
- Standards Processing Coordinator (ADP)
- Institute for Computer Sciences and Technology
- Technology Building, B-64
- National Bureau of Standards
- Gaithersburg, MD 20899
- Phone: (30l) 975-2817
- FIPS PUB 31GUIDELINES FOR ADP PHYSICAL SECURITY AND RISK
- MANAGEMENT
- June 1974
-
- Provides guidance to Federal organizations in
- developing physical security and risk management
- programs for their ADP facilities. Covers security
- analysis, natural disasters, failure of supporting
- utilities, system reliability, procedural measures
- and controls, protection of off-site facilities,
- contingency plans security awareness, and security
- audit. Can be used as a checklist for planning and
- evaluating security of computer systems.
- FIPS PUB 39GLOSSARY FOR COMPUTER SYSTEMS SECURITY
- February 1974
-
- A reference document containing approximately 170
- terms and definitions pertaining to privacy and
- computer security.
- FIPS PUB 41COMPUTER SECURITY GUIDELINES FOR IMPLEMENTING THE
- PRIVACY ACT OF 1974
- May 1975
-
- Provides guidance in the selection of technical and
- related procedural methods for protecting personal
- data in automated information systems. Discusses
- categories of risks and the related safeguards for
- physical security, information management
- practices, and system controls to improve system
- security.FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATIONS (cont.)
-
- FIPS PUB 46DATA ENCRYPTION STANDARD
- January 1977
-
- Specifies an algorithm to be implemented in
- electronic hardware devices and used for the
- cryptographic protection of sensitive, but
- unclassified, computer data. The algorithm
- uniquely defines the mathematical steps required to
- transform computer data into a cryptographic cipher
- and the steps required to transform the cipher back
- to its original form.
- FIPS PUB 48GUIDELINES ON EVALUATION OF TECHNIQUES FOR
- AUTOMATED PERSONAL IDENTIFICATION
- April 1977
-
- Discusses the performance of personal
- identification devices, how to evaluate them and
- considerations for their use within the context of
- computer system security.
- FIPS PUB 65GUIDELINE FOR AUTOMATIC DATA PROCESSING RISK
- ANALYSIS
- August 1979
-
- Presents a technique for conducting a risk analysis
- of an ADP facility and related assets. Provides
- guidance on collecting, quantifying, and analyzing
- data related to the frequency of caused by adverse
- events. This guideline describes the
- characteristics and attributes of a computer system
- that must be known for a risk analysis and gives an
- example of the risk analysis process.
- FIPS PUB 73GUIDELINES FOR SECURITY OF COMPUTER APPLICATIONS
- June 1980
-
- Describes the different security objectives for a
- computer application, explains the control measures
- that can be used, and identifies the decisions that
- should be made at each stage in the life cycle of a
- sensitive computer application. For use in
- planning, developing and operating computer systems
- which require protection. Fundamental security
- controls such a data validation, user identity
- verification, authorization, journalling, variance
- detection, and encryption are discussed.
-
-
-
-
- FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATIONS (cont.)
-
- FIPS PUB 74GUIDELINES FOR IMPLEMENTING AND USING THE NBS DATA
- ENCRYPTION STANDARD
- April 1981
-
- Provides guidance for the use of cryptographic
- techniques when such techniques are required to
- protect sensitive or valuable computer data. For
- use in conjunction with FIPS PUB 46 and FIPS PUB
- 81.
- FIPS PUB 81DES MODES OF OPERATION
- December 1980
-
- Defines four modes of operation for the Data
- Encryption Standard which may be used in a wide
- variety of applications. The modes specify how
- data will be encrypted (cryptographically
- occurrence and the damage protected) and decrypted
- (returned to original form). The modes included in
- this standard are the Electronic Codebook (ECB)
- mode, the Cipher Block Chaining (CBC) mode, the
- Cipher Feedback (CFB) mode, and the Output Feedback
- (OFB) mode.
- FIPS PUB 83GUIDELINE ON USER AUTHENTICATION TECHNIQUES FOR
- COMPUTER NETWORK ACCESS CONTROL
- September 1980
-
- Provides guidance in the selection and
- implementation of techniques for authenticating the
- users of remote terminals in order to safeguard
- against unauthorized access to computers and
- computer networks. Describes use of passwords,
- identification tokens, verification by means of
- personal attributes, identification of remote
- devices, role of encryption in network access
- control, and computerized authorization techniques.
- FIPS PUB 87GUIDELINES FOR ADP CONTINGENCY PLANNING
- March 1981
-
- Describes what should be considered when developing
- a contingency plan for an ADP facility. Provides a
- suggested structure and format which may be used as
- a starting point from which to design a plan to fit
- each specific operation.
-
-
-
-
-
- FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATIONS (cont.)
- FIPS PUB 88GUIDELINE ON INTEGRITY ASSURANCE AND CONTROL IN
- DATABASE APPLICATIONS
- August 1981
-
- Provides explicit advice on achieving database
- integrity and security control. Identifies
- integrity and security problems and discusses
- procedures and methods which have proven effective
- in addressing these problems. Provides an
- explicit, step-by-step procedure for examining and
- verifying the accuracy and completeness of a
- database.
- FIPS PUB 94GUIDELINE ON ELECTRICAL POWER FOR ADP INSTALLATIONS
- September 1982
-
- Provides information on factors in the electrical
- environment that affect the operation of ADP
- systems. Describes the fundamentals of power,
- grounding, life-safety, static electricity, and
- lightning protection requirements, and provides a
- checklist for evaluating ADP sites.
- FIPS PUB 102GUIDELINE FOR COMPUTER SECURITY CERTIFICATION AND
- ACCREDITATION
- September 1983
-
- Describes how to establish and how to carry out a
- certification and accreditation program for
- computer security. Certification consists of a
- technical evaluation of a sensitive system to see
- how well it meets its security requirements.
- Accreditation is the official management
- authorization for the operation of the system and
- is based on the certification process.
- FIPS PUB 112STANDARD ON PASSWORD USAGE
- May 1985
-
- This standard defines ten factors to be considered
- in the design, implementation and use of access
- control systems that are based on passwords. It
- specifies minimum security criteria for such
- systems and provides guidance for selecting
- additional security criteria for password systems
- which must meet higher security requirements.
-
-
-
-
-
- FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATIONS (cont.)
- FIPS PUB 113STANDARD ON COMPUTER DATA AUTHENTICATION
- May 1985
-
- This standard specifies a Data Authentication
- Algorithm (DAA) which, when applied to computer
- data, automatically and accurately detects
- unauthorized modifications, both intentional and
- accidental. Based on the Data Encryption Standard
- (DES), this standard is compatible with
- requirements adopted by the Department of Treasury
- and the banking community to protect electronic
- fund transfer transactions.
-
-
- SPECIAL PUBLICATIONS AND OTHER REPORTS
-
- These publications present the results of ICST studies, investigations,
- and research on computer security and risk management issues.
- Publications are sold by either the Government Printing Office or the
- National Technical Information Service as noted for each entry.
-
-
- SPECIAL PUBLICATIONS
-
- NBS SPEC PUB
- 500-137SECURITY FOR DIAL-UP LINES
- By Eugene F. Troy
- May 1986
-
- Ways to protect computers from intruders via dial-
- up telephone lines are discussed in this guide.
- Highlighted are hardware devices which can be
- fitted to computers or used with their dial-up
- terminals to provide communications protection for
- non-classified computer systems. Six different
- types of hardware devices and the ways that they
- can be used to protect dial-up computer
- communications are described. Also discussed are
- techniques that can be added to computer operating
- systems or incorporated into system management or
- administrative procedures.SPECIAL PUBLICATIONS (Cont.)
-
- NBS SPEC PUB
- 500-134GUIDE ON SELECTING ADP BACKUP PROCESS ALTERNATIVES
- By Irene Isaac
- November 1985
-
- Discusses the selection of ADP backup processing
- support in advance of events that cause the loss of
- data processing capability. Emphasis is placed on
- management support at all levels of the
- organization for planning, funding, and testing of
- an alternate processing strategy. The alternative
- processing methods and criteria for selecting the
- most suitable method are presented, and a checklist
- for evaluating the suitability of alternatives is
- provided.
- NBS SPEC PUB
- 500-133TECHNOLOGY ASSESSMENT; METHODS FOR MEASURING THE
- LEVEL OF COMPUTER SECURITY
- By William Neugent, John Gilligan, Lance Hoffman,
- and Zella G. Ruthberg
- October 1985
-
- The document covers methods for measuring the level
- of computer security, i.e. technical tools or
- processes which can be used to help establish
- positive indications of security adequacy in
- computer applications, systems, and installations.
- The report addresses individual techniques and
- approaches, as well as broader methodologies which
- permit the formulation of a composite measure of
- security that uses the results of these individual
- techniques and approaches.
- NBS SPEC PUB
- 500-121GUIDANCE ON PLANNING AND IMPLEMENTING COMPUTER
- SYSTEMS RELIABILITY
- By Lynne S. Rosenthal
- January 1985
-
- This report presents guidance to managers and
- planners on the basic concepts of computer system
- reliability and on the implementation of a
- management program to improve system reliability.
- Topics covered include techniques for quantifying
- and evaluating data to measure system reliability,
- designing systems for reliability, and recovery of
- a computer system after it has failed or produced
- erroneous output. An appendix contains references
- and a list of selected readings.SPECIAL PUBLICATIONS (Cont.)
-
- NBS SPEC PUB
- 500-120SECURITY OF PERSONAL COMPUTER SYSTEMS - A
- MANAGEMENT GUIDE
- By Dennis D. Steinauer
-
- This publication provides practical advice on the
- following issues: physical and environmental
- protection system and data access control;
- integrity of software and data; backup and
- contingency planning; auditability; communications
- protection. References to additional information,
- a self-audit checklist, and a guide to security
- products for personal computers are included in the
- appendices.
- NBS SPEC PUB
- 500-109OVERVIEW OF COMPUTER SECURITY CERTIFICATION AND
- ACCREDITATION
- By Zella G. Ruthberg and William Neugent
- April 1984
-
- This publication is a summary of and a guide to
- FIPS PUB 102, Guideline to Computer Security
- Certification and Accreditation. It is oriented
- toward the needs of ADP policy managers,
- information resource managers, ADP technical
- managers, and ADP staff in understanding the
- certification and accreditation process.
- NBS SPEC PUB
- 500-85EXECUTIVE GUIDE TO ADP CONTINGENCY PLANNING
- By James K. Shaw and Stuart W. Katzke
- July 1981
-
- This document provides, in the form of questions
- and answers, the background, and basic essential
- information required to understand the
- developmental process for automatic data processing
- (ADP) contingency plans. The primary intended
- audience consists of executives and managers who
- depend on ADP resources and services, yet may not
- be directly responsible for the daily management or
- supervision of data processing activities or
- facilities.SPECIAL PUBLICATIONS (Cont.)
-
- NBS SPEC PUB
- 500-67THE SRI HIERARCHICAL DEVELOPMENT METHODOLOGY (HDM)
- AND ITS APPLICATION TO THE DEVELOPMENT OF SECURE
- SOFTWARE
- By Karl N. Levitt, Peter Neumann, and Lawrence
- Robinson
- October 1980
-
- Describes the SRI Hierarchical Development
- Methodology for designing large software systems
- such as operating systems and data management
- systems that must meet stringent security
- requirements.
- NBS SPEC PUB
- 500-61MAINTENANCE TESTING FOR THE DATA ENCRYPTION
- STANDARD
- By Jason Gait
- August 1980
-
- Describes four tests that can be used by
- manufacturers and users to check the operation of
- data encryption devices. These tests are simple,
- efficient, and independent of the implementation of
- the Data Encryption Standard (FIPS 46).
- NBS SPEC PUB
- 500-57AUDIT AND EVALUATION OF COMPUTER SECURITY II:
- SYSTEM VULNERABILITIES AND CONTROLS
- Edited by Zella G. Ruthberg
- April 1980
-
- Proceedings of the second NBS/GAO workshop to
- develop improved computer security audit
- procedures. Covers eight sessions: three sessions
- on managerial and organizational vulnerabilities
- and controls and five technical sessions on
- terminals and remote peripherals, communication
- components, operating systems, applications and
- non-integrated data files, and data base management
- systems.
- NBS SPEC PUB
- 500-54A KEY NOTARIZATION SYSTEM FOR COMPUTER NETWORKS
- By Miles E. Smid
- October 1979
-
- Describes a system for key notarization, which can
- be used with an encryption device, to improve data
- security in computer networks. The key
- notarization system can be used to communicate
- securely between two users, communicate via
- encrypted mail, protect personal files, and provide
- a digital signature capability.
-
- SPECIAL PUBLICATIONS (Cont.)
-
- NBS SPEC PUB
- 500-50COMPUTERS, PERSONNEL ADMINISTRATION, AND CITIZEN
- RIGHTS
- By Alan F. Westin
- July 1979
-
- Reports on the impact of computers on citizen
- rights in the field of personnel record keeping.
- This study traces the changing patterns of
- employment and personnel administration and
- examines the trends in computer use in personnel
- administration. It recommends policy actions to
- guide the management of personnel systems that
- respect citizen rights.
- NBS SPEC PUB
- 500-33CONSIDERATIONS IN THE SELECTION OF SECURITY
- MEASURES OF AUTOMATIC DATA PROCESSING SYSTEMS
- By Michel J. Orceyre and Robert H. Cortney, Jr.
- Edited by Gloria R. Bolotsky
-
- Details methods and techniques for protecting data
- processed by computer and transmitted via
- telecommunications lines. This report identifies
- the controls that can be instituted to protect ADP
- systems when risks and potential losses have been
- identified.
- NBS SPEC PUB
- 500-27COMPUTER SECURITY AND THE DATA ENCRYPTION STANDARD
- Edited by Dennis Branstad
- February 1978
-
- Includes papers and summaries of presentations made
- at a l978 conference on computer security. Subject
- areas are physical security, risk assessment,
- software security, computer network security,
- applications and implementation of the Data
- Encryption Standard.
- NBS SPEC PUB
- 500-25AN ANALYSIS OF COMPUTER SECURITY SAFEGUARDS FOR
- DETECTING AND PREVENTING INTENTIONAL COMPUTER
- MISUSE
- By Brian Ruder and J. D. Madden
- January 1978
-
- Analyzes 88 computer safeguard techniques that
- could be applied to recorded actual computer misuse
- cases. Presents a model for use in classifying and
- evaluating safeguards as mechanisms for detecting
- and preventing misuse.SPECIAL PUBLICATIONS (Cont.)
-
- NBS SPEC PUB
- 500-24PERFORMANCE ASSURANCE AND DATA INTEGRITY PRACTICES
- By Robert L. Patrick
- January 1978
-
- Details practices and methods that have been
- successful in preventing or reducing computer
- system failures caused by programming and data
- errors. The methods described cover large data
- processing applications, scientific computing
- applications, programming techniques and systems
- design.
- NBS SPEC PUB
- 500-21DESIGN ALTERNATIVES FOR COMPUTER NETWORK SECURITY
- (VOL. 1) THE NETWORK SECURITY CENTER: A SYSTEM
- LEVEL APPROACH TO COMPUTER NETWORK SECURITY (VOL.
- 2)
- By Gerald D. Cole and Frank Heinrich
- January 1978
-
- This two-volume study covers network security
- requirements and design and implementation
- requirements of a special computer dedicated to
- network security. The approach utilizes a
- dedicated minicomputer to check authentication of
- network users, and, to some extent, to check
- authorization. The study focuses on use of the
- Data Encryption Standard to protect network data
- and recommends procedures for generating,
- distributing and protecting encryption keys.
- NBS SPEC PUB
- 500-20VALIDATING THE CORRECTNESS OF HARDWARE
- IMPLEMENTATIONS OF THE NBS DATA ENCRYPTION STANDARD
- By Jason Gait
- November 1977
-
- Describes the design and operation of the NBS
- testbed that is used for the validation of hardware
- implementations of the Data Encryption Standard
- (DES). This report provides the full specification
- of the DES algorithm, a complete listing of the DES
- test set and a detailed description of the
- interface to the testbed.
- SPECIAL PUBLICATIONS (Cont.)
-
- NBS SPEC PUB
- 500-19AUDIT AND EVALUATION OF COMPUTER SECURITY
- Edited by Zella Ruthberg and Robert McKenzie
- October 1977
-
- Reports on the recommendations of audit and
- computer experts to improve computer security audit
- procedures. Subjects covered include audit
- standards, administrative and physical controls,
- program and data integrity, and audit tools and
- techniques.
- NBS SPEC PUB
- 500-10A DATA BASE MANAGEMENT APPROACH TO PRIVACY ACT
- COMPLIANCE
- By Elizabeth Fong
- June 1977
-
- Discusses how commercially available data base
- management systems can be used to implement Privacy
- Act requirements for the handling of personal data.
- NBS SPEC PUB
- 500-9THE USE OF PASSWORDS FOR CONTROLLED ACCESS TO
- COMPUTER RESOURCES
- By Helen Wood
- May 1977
-
- Describes the need for and uses of passwords.
- Password schemes are categorized according to
- selection technique, lifetime, physical
- characteristics and information content. Password
- protection and cost considerations are discussed.
- A glossary and annotated bibliography are included.
- NBS SPEC PUB
- 500-2ACCESSING INDIVIDUAL RECORDS FROM PERSONAL DATA
- FILES USING NONUNIQUE IDENTIFIERS
- By Gwendolyn B. Moore, John L. Kuhns, Jeffrey L.
- Treffzs and Christine A. Montgomery
- February 1977
-
- Analyzes methodologies for retrieving personal
- information using nonunique identifiers such as
- name, address, etc. This study presents
- statistical data for judging the accuracy and
- efficiency of various methods.
- OTHER REPORTS
-
- NBSIR 86-3386WORK PRIORITY SCHEME FOR EDP AUDIT AND COMPUTER
- SECURITY REVIEW
- By Zella Ruthberg and Bonnie Fisher
- August 1986
-
- This publication describes a methodology for
- prioritizing the work performed EDP auditors and
- computer security reviewers. Developed at an
- invitational workshop attended by government and
- private sector experts, the work plan enables users
- to evaluate computer systems for both EDP audit and
- security review functions and to develop a
- measurement of the risk of the systems. Based on
- this measure of risk, the auditor can then
- determine where to spend review time.
-
- SUBJECT INDEX
-
-
-
-
- Contingency Planning Physical
- Security
-
- FIPS PUB 87 FIPS PUB
- 31
- SPEC PUB 500-85
- Power,
- Grounding, and Life
- Database Security Safety
-
- FIPS PUB 88 FIPS PUB
- 94
-
- Encryption Privacy
-
- FIPS PUB 46 FIPS PUB
- 41
- FIPS PUB 74 SPEC PUB
- 500-10
- FIPS PUB 81 SPEC PUB
- 500-50
- FIPS PUB 113
- SPEC PUB 500-20
- SPEC PUB 500-27 Risk
- Management
- SPEC PUB 500-54
- SPEC PUB 500-61 FIPS PUB
- 31
- FIPS PUB
- 65
- Evaluation of Computer Security
- Software and
- Operating Systems
- FIPS PUB 102
- SPEC PUB
- 500-19
- SPEC PUB 500-
- 2
- SPEC PUB
- 500-57
- SPEC PUB 500-
- 24
- SPEC PUB
- 500-109
- SPEC PUB 500-
- 25
- SPEC PUB
- 500-133
- SPEC PUB 500-
- 67
- NBSIR
- 86-3386
- SPEC PUB 500-
- 121
-
- SPEC PUB 500-
- 134
- General
- Computer
- Security
-
- FIPS PUB
- 39
- User
- Authenticat-
- ion
- FIPS PUB
- 73
- FIPS PUB
- 112
- FIPS PUB 48
- SPEC PUB
- 500-24
- FIPS PUB 83
- SPEC PUB
- 500-25
- SPEC PUB 500-
- 9
- SPEC PUB
- 500-33
- SPEC PUB
- 500-120
- SPEC PUB
- 500-137
-
- Network
- Security
-
- SPEC PUB
- 500-21
- SPEC PUB 500-33
- SPEC PUB 500-54
-
- PRICE LIST
-
- PUBLICATION ORDERING NUMBER
- PRICE
-
- FIPS PUB 31
- $11.95
- FIPS PUB 39 $
- 9.95
- FIPS PUB 41 $
- 9.95
- FIPS PUB 46 $
- 9.95
- FIPS PUB 48 $
- 9.95
- FIPS PUB 65 $
- 9.95
- FIPS PUB 73
- $11.95
- FIPS PUB 74 $
- 9.95
- FIPS PUB 81 $
- 9.95
- FIPS PUB 83 $
- 9.95
- FIPS PUB 87 $
- 9.95
- FIPS PUB 88
- $11.95
- FIPS PUB 94
- $16.95
- FIPS PUB 102
- $11.95
- FIPS PUB 112
- $11.95
- FIPS PUB 113 $
- 9.95
-
-
- SPEC PUB 2 PB 263123
- $11.95
- SPEC PUB 9 PB 266323
- $11.95
- SPEC PUB 10 SN 003-003-01787-6 $
- 4.50
- SPEC PUB 19 PB 272971
- $22.95
- SPEC PUB 20 PB 113524 $
- 9.95
- SPEC PUB 21 PB 276772
- $11.95
- SPEC PUB 24PB
- 276400
- $11.95
- SPEC PUB 25PB
- 275514
- $11.95
- SPEC PUB 27PB
- 277695
- $16.95
- SPEC PUB 33PB
- 282511 $
- 9.95
- SPEC PUB 50PB
- 298299
- $34.95
- SPEC PUB 54SN
- 003-003-
- 02130-0 $
- 4.50
- SPEC PUB 57SN
- 003-003-
- 02178-4 $
- 7.00
- SPEC PUB 61PB
- 221211 $
- 9.95
- SPEC PUB 67SN
- 003-003-
- 02258-6 $
- 4.25
- SPEC PUB 85PB
- 165226 $
- 9.95
- SPEC PUB 109
- SN 003-003-
- 02567-4 $
- 1.50
- SPEC PUB 120
- SN 003-003-
- 02627-1 $
- 3.00
- SPEC PUB 121
- SN 003-003-
- 02628-0 $
- 2.25
- SPEC PUB 133
- SN 003-003-
- 02686-7 $
- 8.00
- SPEC PUB 134
- SN 003-003-
- 02701-4 $
- 1.75
- SPEC PUB 137
- SN 003-003-
- 02723-5 $ 3.75
-
-
- NBSIR 86-3386 PB 247897 $11.95
- Downloaded From P-80 International Information Systems 304-744-2253
-